Scanprojet Semq4x
Scanprojet Semq4x
ia
nt
se
scanprojet
Es
Report generated by Tenable Nessus™ Thu, 19 Dec 2024 20:05:21 Morocco Standard Time
us
ss
Ne
TABLE OF CONTENTS
Vulnerabilities by Plugin
• 20007 (2) - SSL Version 2 and 3 Protocol Detection.............................................................................................8
• 32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check).........11
• 32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness............................ 13
• 46882 (1) - UnrealIRCd Backdoor Detection........................................................................................................15
ls
• 61708 (1) - VNC Server 'password' Password......................................................................................................18
ia
• 171340 (1) - Apache Tomcat SEoL (<= 5.5.x)....................................................................................................... 22
nt
• 42873 (2) - SSL Medium Strength Cipher Suites Supported (SWEET32).......................................................... 23
• 10205 (1) - rlogin Service Detection..................................................................................................................... 25
se
• 10245 (1) - rsh Service Detection..........................................................................................................................27
•
Es
• 33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning................................................ 58
• 42263 (1) - Unencrypted Telnet Server................................................................................................................ 60
• 52611 (1) - SMTP Service STARTTLS Plaintext Command Injection.................................................................. 62
• 81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK).............................................. 66
• 89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened
eNcryption).................................................................................................................................................................. 68
• 139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS........................................................72
• 78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)................... 74
• 10114 (1) - ICMP Timestamp Request Remote Date Disclosure.......................................................................76
• 83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)............................... 79
• 83875 (1) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)................................................................ 81
• 10150 (1) - Windows NetBIOS / SMB Remote Host Information Disclosure................................................. 118
• 10223 (1) - RPC portmapper Service Detection................................................................................................ 119
• 10397 (1) - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure............................................... 125
• 10437 (1) - NFS Share Export List.......................................................................................................................126
• 10785 (1) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure............ 128
• 10881 (1) - SSH Protocol Versions Supported...................................................................................................129
• 11422 (1) - Web Server Unconfigured - Default Install Page Present............................................................ 132
• 11424 (1) - WebDAV Detection............................................................................................................................133
• 96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check).................... 168
• 100871 (1) - Microsoft Windows SMB Versions Supported (remote check).................................................. 170
• 104887 (1) - Samba Version................................................................................................................................ 171
• 106716 (1) - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)...............................172
• 110723 (1) - Target Credential Status by Authentication Protocol - No Credentials Provided.....................173
• 117886 (1) - OS Security Patch Assessment Not Available..............................................................................175
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:
ls
- Insecure session renegotiation and resumption schemes.
ia
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications
between the affected service and clients.
Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so
nt
that these versions will be used only if the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE).
Therefore, it is recommended that these protocols be disabled entirely.
se
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
Es
See Also
https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
us
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
ss
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
Ne
https://tools.ietf.org/html/rfc7568
Solution
Risk Factor
Critical
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
Description
The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system
which contains a bug in the random number generator of its OpenSSL library.
ls
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.
ia
An attacker can easily obtain the private part of the remote key and use this to decipher the remote session
or set up a man in the middle attack.
nt
See Also
http://www.nessus.org/u?107f9bdc
se
http://www.nessus.org/u?f14f4224
Solution
Es
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
us
Risk Factor
Critical
ss
VPR Score
5.1
Ne
EPSS Score
0.2029
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check) 11
References
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/5432/postgresql)
32321 (2) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check) 12
32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator
Weakness
Synopsis
Description
The remote SSH host key has been generated on a Debian or Ubuntu system which contains a bug in the
random number generator of its OpenSSL library.
ls
The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.
ia
An attacker can easily obtain the private part of the remote key and use this to set up decipher the remote
session or set up a man in the middle attack.
nt
See Also
http://www.nessus.org/u?107f9bdc
se
http://www.nessus.org/u?f14f4224
Solution
Es
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.
us
Risk Factor
Critical
ss
VPR Score
5.1
Ne
EPSS Score
0.2029
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Plugin Information
Plugin Output
192.168.11.129 (tcp/22/ssh)
Synopsis
Description
The remote IRC server is a version of UnrealIRCd with a backdoor that allows an attacker to execute
arbitrary code on the affected host.
ls
See Also
https://seclists.org/fulldisclosure/2010/Jun/277
ia
https://seclists.org/fulldisclosure/2010/Jun/284
http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt
nt
Solution
Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
se
Risk Factor
Es
Critical
VPR Score
us
7.4
EPSS Score
ss
0.6956
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 40820
CVE CVE-2010-2075
Plugin Information
Plugin Output
192.168.11.129 (tcp/6667/irc)
uid=0(root) gid=0(root)
Synopsis
Description
A shell is listening on the remote port without any authentication being required. An attacker may use it by
connecting to the remote port and sending commands directly.
ls
Solution
Verify if the remote host has been compromised, and reinstall the system if necessary.
ia
Risk Factor
nt
Critical
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/1524/wild_shell)
Ne
Synopsis
A VNC server running on the remote host is secured with a weak password.
Description
The VNC server running on the remote host is secured with a weak password. Nessus was able to login
using VNC authentication and a password of 'password'. A remote, unauthenticated attacker could exploit
this to take control of the system.
ls
Solution
ia
Secure the VNC service with a strong password.
Risk Factor
nt
Critical se
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/5900/vnc)
ss
Synopsis
Description
A file read/inclusion vulnerability was found in A JP connector. A remote, unauthenticated attacker could
exploit this vulnerability to read web application files from a vulnerable server. In instances where the
vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within
a variety of file types and gain remote code execution (RCE).
ls
See Also
ia
http://www.nessus.org/u?8ebe6246
http://www.nessus.org/u?4e287adb
nt
http://www.nessus.org/u?cbc3d54e
https://access.redhat.com/security/cve/CVE-2020-1745
https://access.redhat.com/solutions/4851251
se
http://www.nessus.org/u?dd218234
http://www.nessus.org/u?dd772531
Es
http://www.nessus.org/u?2a01d6bf
http://www.nessus.org/u?3b5af27e
http://www.nessus.org/u?9dab109f
http://www.nessus.org/u?5eafcf70
us
Solution
ss
Update the A JP configuration to require authorization and/or upgrade the Tomcat server to 7.0.100, 8.5.51,
9.0.31 or later.
Ne
Risk Factor
High
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
9.0
EPSS Score
0.9742
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2020-1745
CVE CVE-2020-1938
XREF CISA-KNOWN-EXPLOITED:2022/03/17
XREF CEA-ID:CEA-2020-0021
Plugin Information
Plugin Output
192.168.11.129 (tcp/8009/ajp13)
Nessus was able to exploit the issue using the following request :
0x0000: 02 02 00 08 48 54 54 50 2F 31 2E 31 00 00 0F 2F ....HTTP/1.1.../
0x0010: 61 73 64 66 2F 78 78 78 78 78 2E 6A 73 70 00 00 asdf/xxxxx.jsp..
0x0020: 09 6C 6F 63 61 6C 68 6F 73 74 00 FF FF 00 09 6C .localhost.....l
0x0030: 6F 63 61 6C 68 6F 73 74 00 00 50 00 00 09 A0 06 ocalhost..P.....
0x0040: 00 0A 6B 65 65 70 2D 61 6C 69 76 65 00 00 0F 41 ..keep-alive...A
0x0050: 63 63 65 70 74 2D 4C 61 6E 67 75 61 67 65 00 00 ccept-Language..
0x0060: 0E 65 6E 2D 55 53 2C 65 6E 3B 71 3D 30 2E 35 00 .en-US,en;q=0.5.
0x0070: A0 08 00 01 30 00 00 0F 41 63 63 65 70 74 2D 45 ....0...Accept-E
0x0080: 6E 63 6F 64 69 6E 67 00 00 13 67 7A 69 70 2C 20 ncoding...gzip,
0x0090: 64 65 66 6C 61 74 65 2C 20 73 64 63 68 00 00 0D deflate, sdch...
0x00A0: 43 61 63 68 65 2D 43 6F 6E 74 72 6F 6C 00 00 09 Cache-Control...
0x00B0: 6D 61 78 2D 61 67 65 3D 30 00 A0 0E 00 07 4D 6F max-age=0.....Mo
0x00C0: 7A 69 6C 6C 61 00 00 19 55 70 67 72 61 64 65 2D zilla...Upgrade-
0x00D0: 49 6E 73 65 63 75 72 65 2D 52 65 71 75 65 73 74 Insecure-Request
0x00E0: 73 00 00 01 31 00 A0 01 00 09 74 65 78 74 2F 68 s...1.....text/h
0x00F0: 74 6D 6C 00 A0 0B 00 09 6C 6F 63 61 6C 68 6F 73 tml.....localhos
0x0100: 74 00 0A 00 21 6A 61 76 61 78 2E 73 65 72 76 6C t...!javax.servl
0x0110: 65 74 2E 69 6E 63 6C 75 64 65 2E 72 65 71 75 65 et.include.reque
0x0120: 73 74 5F 75 72 69 00 00 01 31 00 0A 00 1F 6A 61 st_uri...1....ja
0x0130: 76 61 78 2E 73 65 72 76 6C 65 74 2E 69 6E 63 6C vax.servlet.incl
0x0140: 75 64 65 2E 70 61 74 68 5F 69 6E 66 6F 00 00 10 ude.path_info...
0x0150: 2F 57 45 42 2D 49 4E 46 2F 77 65 62 2E 78 6D 6C /WEB-INF/web.xml
Synopsis
Description
According to its version, Apache Tomcat is less than or equal to 5.5.x. It is, therefore, no longer maintained
by its vendor or provider.
Lack of support implies that no new security patches for the product will be released by the vendor. As a
ls
result, it may contain security vulnerabilities.
ia
See Also
https://tomcat.apache.org/tomcat-55-eol.html
nt
Solution
Critical
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Ne
Plugin Output
192.168.11.129 (tcp/8180/www)
URL : http://192.168.11.129:8180/
Installed version : 5.5
Security End of Life : September 29, 2012
Time since Security End of Life (Est.) : >= 12 years
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that
uses the 3DES encryption suite.
ls
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
ia
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
nt
https://sweet32.info
se
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Es
Risk Factor
Medium
us
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
ss
VPR Score
5.1
Ne
EPSS Score
0.0398
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2016-2183
Plugin Output
192.168.11.129 (tcp/25/smtp)
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.11.129 (tcp/5432/postgresql)
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
Description
The rlogin service is running on the remote host. This service is vulnerable since data is passed between
the rlogin client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local
ls
network) then it may be possible to bypass authentication.
Finally, rlogin is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.
ia
Solution
nt
Comment out the 'login' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this
service and use SSH instead.
se
Risk Factor
High
Es
VPR Score
7.4
us
EPSS Score
0.015
ss
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Ne
References
CVE CVE-1999-0651
Exploitable With
Metasploit (true)
Plugin Information
192.168.11.129 (tcp/513/rlogin)
Synopsis
Description
The rsh service is running on the remote host. This service is vulnerable since data is passed between
the rsh client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local
ls
network) then it may be possible to bypass authentication.
Finally, rsh is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.
ia
Solution
nt
Comment out the 'rsh' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this service
and use SSH instead.
se
Risk Factor
High
Es
VPR Score
7.4
us
EPSS Score
0.015
ss
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Ne
References
CVE CVE-1999-0651
Exploitable With
Metasploit (true)
Plugin Information
192.168.11.129 (tcp/514/rsh)
Synopsis
Description
The remote NFS server is exporting one or more shares without restricting access (based on hostname, IP,
or IP range).
ls
See Also
http://www.tldp.org/HOWTO/NFS-HOWTO/security.html
ia
Solution
nt
Place the appropriate restrictions on all NFS shares.
Risk Factor
se
Medium
Es
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
ss
Plugin Information
Plugin Output
192.168.11.129 (tcp/2049/rpc-nfs)
/ *
Synopsis
An SMB server running on the remote host is affected by the Badlock vulnerability.
Description
The version of Samba, a CIFS/SMB server for Linux and Unix, running on the remote host is affected by
a flaw, known as Badlock, that exists in the Security Account Manager (SAM) and Local Security Authority
(Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure
Call (RPC) channels. A man-in-the-middle attacker who is able to able to intercept the traffic between a
ls
client and a server hosting a SAM database can exploit this flaw to force a downgrade of the authentication
level, which allows the execution of arbitrary Samba network calls in the context of the intercepted user,
such as viewing or modifying sensitive security data in the Active Directory (AD) database or disabling
ia
critical services.
nt
See Also
http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html
se
Solution
Es
Risk Factor
us
Medium
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
5.9
EPSS Score
0.0489
5.0 (CVSS2#E:U/RL:OF/RC:C)
References
BID 86002
CVE CVE-2016-2118
XREF CERT:813296
Plugin Information
Plugin Output
192.168.11.129 (tcp/445/cifs)
Nessus detected that the Samba Badlock patch has not been applied.
Synopsis
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.
Description
According to its self-reported version, the instance of ISC BIND 9 running on the remote name server
is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not
sufficiently limiting the number fetches which may be performed while processing a referral response.
ls
An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or
to use the affected server as a reflector in a reflection attack.
ia
See Also
https://kb.isc.org/docs/cve-2020-8616
Solution
nt
se
Upgrade to the ISC BIND version referenced in the vendor advisory.
Risk Factor
Es
Medium
8.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
7.7 (CVSS:3.0/E:P/RL:O/RC:C)
Ne
VPR Score
5.2
EPSS Score
0.0053
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2020-8616
XREF IAVA:2020-A-0217-S
Plugin Information
Plugin Output
192.168.11.129 (udp/53/dns)
Synopsis
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and
reports whether any have already expired.
ls
Solution
ia
Risk Factor
nt
Medium
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/25/smtp)
Ne
192.168.11.129 (tcp/5432/postgresql)
Synopsis
Description
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Solution
ls
Purchase or generate a proper SSL certificate for this service.
ia
Risk Factor
Medium
nt
CVSS v3.0 Base Score
se
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/25/smtp)
Ne
192.168.11.129
192.168.11.129
ubuntu804-base.localdomain
192.168.11.129 (tcp/5432/postgresql)
192.168.11.129
192.168.11.129
ubuntu804-base.localdomain
Synopsis
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which
the chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public
ls
certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are missing that would connect the top of the certificate chain
to a known public certificate authority.
ia
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the
nt
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be
se
re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users
to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-
Es
See Also
us
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
ss
Solution
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Output
192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/5432/postgresql)
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote
host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-
middle attack against the remote host.
ls
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but
is signed by an unrecognized certificate authority.
ia
Solution
Risk Factor
nt
se
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
ss
Plugin Output
Ne
192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/5432/postgresql)
Synopsis
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of
small biases are introduced into the stream, decreasing its randomness.
ls
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
ia
See Also
nt
https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
se
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Es
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with
AES-GCM suites subject to browser and web server support.
us
Risk Factor
Medium
ss
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
VPR Score
4.4
EPSS Score
0.0079
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.7 (CVSS2#E:U/RL:ND/RC:C)
References
BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.11.129 (tcp/5432/postgresql)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like
1.2 and 1.3 are designed against these flaws and should be used whenever possible.
ls
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly
with major web browsers and major vendors.
ia
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.
nt
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
se
Solution
Es
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
Risk Factor
us
Medium
6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)
References
XREF CWE:327
Plugin Information
Plugin Output
192.168.11.129 (tcp/5432/postgresql)
Synopsis
Description
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods
that are used to debug web server connections.
ls
See Also
http://www.nessus.org/u?e979b5cb
ia
http://www.apacheweek.com/issues/03-01-24
https://download.oracle.com/sunalerts/1000718.1.html
nt
Solution
Disable these HTTP methods. Refer to the plugin output for more information.
se
Risk Factor
Es
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
Ne
4.0
EPSS Score
0.0225
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
BID 9506
BID 9561
BID 11604
BID 33374
BID 37995
CVE CVE-2003-1567
CVE CVE-2004-2320
CVE CVE-2010-0386
XREF CERT:288308
XREF CERT:867593
XREF CWE:16
XREF CWE:200
Plugin Information
Plugin Output
192.168.11.129 (tcp/80/www)
To disable these methods, add the following lines for each virtual
host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Synopsis
Description
The default error page, default index page, example JSPs and/or example servlets are installed on the
remote Apache Tomcat server. These files should be removed as they may help an attacker uncover
information about the remote Tomcat install or host itself.
ls
See Also
ia
http://www.nessus.org/u?4cb3b4dd
https://www.owasp.org/index.php/Securing_tomcat
nt
Solution
Delete the default index page and remove the example JSP and servlets. Follow the Tomcat or OWASP
se
instructions to replace or modify the default error page.
Risk Factor
Es
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Ne
Plugin Output
192.168.11.129 (tcp/8180/www)
http://192.168.11.129:8180/tomcat-docs/index.html
The server is not configured to return a custom page in the event of a client requesting a non-
existent resource.
Synopsis
Description
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.
This may allow a remote attacker to determine which domains have recently been resolved via this name
server, and therefore which hosts have been recently visited.
ls
For instance, if an attacker was interested in whether your company utilizes the online services of a
particular financial institution, they would be able to use this attack to build a statistical model regarding
ia
company usage of that financial institution. Of course, the attack can also be used to find B2B partners,
web-surfing patterns, external mail servers, and more.
Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the
nt
internal network. This may include employees, consultants and potentially users on a guest network or
WiFi connection if supported.
se
See Also
http://cs.unc.edu/~fabian/course_papers/cache_snooping.pdf
Es
Solution
Risk Factor
Medium
ss
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Ne
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Plugin Output
192.168.11.129 (udp/53/dns)
93.184.215.14
Synopsis
Description
The remote host supports the use of SSL ciphers that offer weak encryption.
Note: This is considerably easier to exploit if the attacker is on the same physical network.
ls
See Also
ia
http://www.nessus.org/u?6527892d
Solution
nt
Reconfigure the affected application, if possible to avoid the use of weak ciphers.
se
Risk Factor
Medium
Es
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
us
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
ss
References
XREF CWE:326
Ne
XREF CWE:327
XREF CWE:720
XREF CWE:753
XREF CWE:803
XREF CWE:928
XREF CWE:934
Plugin Information
192.168.11.129 (tcp/25/smtp)
Here is the list of weak SSL ciphers supported by the remote server :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
Description
The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up
a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to
verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.
ls
Note: This is considerably easier to exploit if the attacker is on the same physical network.
ia
See Also
http://www.nessus.org/u?3a040ada
nt
Solution
Low
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
Ne
4.4
EPSS Score
0.003
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
References
BID 28482
CVE CVE-2007-1858
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
The following is a list of SSL anonymous ciphers supported by the remote TCP server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
The remote name resolver (or the server it uses upstream) is affected by a DNS cache poisoning
vulnerability.
Description
The remote DNS resolver does not use random ports when making queries to third-party DNS servers. An
unauthenticated, remote attacker can exploit this to poison the remote DNS server, allowing the attacker to
divert legitimate traffic to arbitrary sites.
ls
See Also
ia
https://www.cnet.com/news/massive-coordinated-dns-patch-released/
https://www.theregister.co.uk/2008/07/21/dns_flaw_speculation/
Solution
nt
se
Contact your DNS server vendor for a patch.
Risk Factor
Es
Medium
6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)
6.1 (CVSS:3.0/E:P/RL:O/RC:C)
VPR Score
Ne
6.0
EPSS Score
0.2471
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning 58
3.9 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
BID 30131
CVE CVE-2008-1447
XREF CERT:800113
XREF IAVA:2008-A-0045
XREF EDB-ID:6122
XREF EDB-ID:6123
XREF EDB-ID:6130
Plugin Information
Plugin Output
192.168.11.129 (udp/53/dns)
33447 (1) - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning 59
42263 (1) - Unencrypted Telnet Server
Synopsis
Description
Using Telnet over an unencrypted channel is not recommended as logins, passwords, and commands are
transferred in cleartext. This allows a remote, man-in-the-middle attacker to eavesdrop on a Telnet session
ls
to obtain credentials or other sensitive information and to modify traffic exchanged between a client and
server.
ia
SSH is preferred over Telnet since it protects credentials from eavesdropping and can tunnel additional
data streams such as an X11 session.
nt
Solution
Medium
Es
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
us
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
ss
Plugin Information
Ne
Plugin Output
192.168.11.129 (tcp/23/telnet)
Nessus collected the following banner from the remote Telnet server :
Synopsis
The remote mail service allows plaintext command injection while negotiating an encrypted
communications channel.
Description
The remote SMTP service contains a software flaw in its STARTTLS implementation that could allow a
remote, unauthenticated attacker to inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.
ls
Successful exploitation could allow an attacker to steal a victim's email or associated SASL (Simple
Authentication and Security Layer) credentials.
ia
See Also
nt
https://tools.ietf.org/html/rfc2487
https://www.securityfocus.com/archive/1/516901/30/0/threaded
se
Solution
Risk Factor
Medium
us
VPR Score
7.3
ss
EPSS Score
Ne
0.0135
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
3.1 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 46767
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
STARTTLS\r\nRSET\r\n
Synopsis
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to
conduct man-in-the-middle attacks against the SMB server.
ls
See Also
http://www.nessus.org/u?df39b8b3
ia
http://technet.microsoft.com/en-us/library/cc731957.aspx
http://www.nessus.org/u?74b80723
nt
https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
http://www.nessus.org/u?a3cac4ea
se
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting
'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server
Es
Risk Factor
us
Medium
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information
Plugin Output
192.168.11.129 (tcp/445/cifs)
Synopsis
Description
The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker
can factor a 512-bit RSA modulus in a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g.
ls
CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.
ia
See Also
https://www.smacktls.com/#freak
nt
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4
se
Solution
Risk Factor
Medium
us
VPR Score
3.7
ss
EPSS Score
0.9488
Ne
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 71936
81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) 66
CVE CVE-2015-0204
XREF CERT:243585
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
81606 (1) - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK) 67
89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and
Weakened eNcryption)
Synopsis
The remote host may be affected by a vulnerability that allows a remote attacker to potentially decrypt
captured TLS traffic.
Description
The remote host supports SSLv2 and therefore may be affected by a vulnerability that allows a cross-
protocol Bleichenbacher padding oracle attack known as DROWN (Decrypting RSA with Obsolete and
ls
Weakened eNcryption). This vulnerability exists due to a flaw in the Secure Sockets Layer Version 2 (SSLv2)
implementation, and it allows captured TLS traffic to be decrypted. A man-in-the-middle attacker can
exploit this to decrypt the TLS connection by utilizing previously captured traffic and weak cryptography
ia
along with a series of specially crafted connections to an SSLv2 server that uses the same private key.
nt
See Also
https://drownattack.com/
https://drownattack.com/drown-attack-paper.pdf
se
Solution
Es
Disable SSLv2 and export grade cryptography cipher suites. Ensure that private keys are not used anywhere
with server software that supports SSLv2 connections.
Risk Factor
us
Medium
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Ne
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
3.6
EPSS Score
0.9434
89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption) 68
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 83733
CVE CVE-2016-0800
XREF CERT:583776
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
The remote host is affected by SSL DROWN and supports the following
vulnerable cipher suites :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
89058 (1) - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption) 69
136808 (1) - ISC BIND Denial of Service
Synopsis
Description
A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 /
9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue,
via a specially-crafted message, to cause the service to stop responding.
ls
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.
ia
See Also
https://kb.isc.org/docs/cve-2020-8617
Solution
nt
se
Upgrade to the patched release most closely related to your current version of BIND.
Risk Factor
Es
Medium
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.3 (CVSS:3.0/E:P/RL:O/RC:C)
Ne
VPR Score
4.4
EPSS Score
0.9728
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.4 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2020-8617
XREF IAVA:2020-A-0217-S
Plugin Information
Plugin Output
192.168.11.129 (udp/53/dns)
Synopsis
Description
According to its self-reported version number, the installation of ISC BIND running on the remote name
server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected
by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated
response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a
ls
truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
ia
version number.
See Also
nt
https://kb.isc.org/docs/cve-2020-8622
se
Solution
Risk Factor
Medium
us
6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
ss
5.7 (CVSS:3.0/E:U/RL:O/RC:C)
Ne
VPR Score
4.4
EPSS Score
0.004
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)
139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS 72
CVSS v2.0 Temporal Score
3.0 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
References
CVE CVE-2020-8622
XREF IAVA:2020-A-0385-S
Plugin Information
Plugin Output
192.168.11.129 (udp/53/dns)
139915 (1) - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS 73
78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption
Vulnerability (POODLE)
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
ls
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL 3.0 connections.
ia
As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1
or newer is supported by the client and service.
nt
The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that
cannot disable SSLv3 immediately should enable this mechanism.
se
This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.
Es
See Also
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
us
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
Solution
ss
Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
Ne
disabled.
Risk Factor
Medium
3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)
3.1 (CVSS:3.0/E:P/RL:O/RC:C)
78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) 74
VPR Score
5.1
EPSS Score
0.9746
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.
192.168.11.129 (tcp/5432/postgresql)
Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.
78479 (2) - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) 75
10114 (1) - ICMP Timestamp Request Remote Date Disclosure
Synopsis
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that
is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-
based authentication protocols.
ls
Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect,
but usually within 1000 seconds of the actual system time.
ia
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
nt
se
Low
VPR Score
Es
2.2
EPSS Score
us
0.8939
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
References
Ne
CVE CVE-1999-0524
XREF CWE:200
Plugin Information
Plugin Output
192.168.11.129 (icmp/0)
Synopsis
Description
The remote host is running an X11 server. X11 is a client-server protocol that can be used to display
graphical applications running on a given host on a remote client.
Since the X11 traffic is not ciphered, it is possible for an attacker to eavesdrop on the connection.
ls
Solution
ia
Restrict access to this port. If the X11 client/server facility is not used, disable TCP support in X11 entirely (-
nolisten tcp).
nt
Risk Factor
Low
se
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/6000/x11)
ss
Synopsis
Description
The remote host supports EXPORT_DHE cipher suites with keys less than or equal to 512 bits. Through
cryptanalysis, a third party can find the shared secret in a short amount of time.
ls
A man-in-the middle attacker may be able to downgrade the session to use EXPORT_DHE cipher suites.
Thus, it is recommended to remove support for weak cipher suites.
ia
See Also
nt
https://weakdh.org/
Solution
se
Reconfigure the service to remove support for EXPORT_DHE cipher suites.
Risk Factor
Es
Low
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
3.2 (CVSS:3.0/E:U/RL:O/RC:C)
Ne
VPR Score
4.5
EPSS Score
0.9698
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) 79
CVSS v2.0 Temporal Score
2.2 (CVSS2#E:U/RL:ND/RC:C)
References
BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
83738 (1) - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam) 80
83875 (1) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
Synopsis
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to
1024 bits.
Description
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal
to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount
of time (depending on modulus size and attacker resources). This may allow an attacker to recover the
ls
plaintext or potentially violate the integrity of connections.
ia
See Also
https://weakdh.org/
nt
Solution
se
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Es
Low
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
3.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
Ne
4.5
EPSS Score
0.9698
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
References
BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
ls
network is loaded.
ia
Solution
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/21/ftp)
us
192.168.11.129 (tcp/22/ssh)
192.168.11.129 (tcp/23/telnet)
192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/53/dns)
192.168.11.129 (tcp/80/www)
192.168.11.129 (tcp/111/rpc-portmapper)
192.168.11.129 (tcp/139/smb)
192.168.11.129 (tcp/445/cifs)
192.168.11.129 (tcp/512)
192.168.11.129 (tcp/513/rlogin)
192.168.11.129 (tcp/514/rsh)
192.168.11.129 (tcp/1099/rmi_registry)
192.168.11.129 (tcp/1524/wild_shell)
192.168.11.129 (tcp/2049/rpc-nfs)
192.168.11.129 (tcp/2121)
192.168.11.129 (tcp/3306/mysql)
192.168.11.129 (tcp/3632)
192.168.11.129 (tcp/5432/postgresql)
192.168.11.129 (tcp/5900/vnc)
192.168.11.129 (tcp/6000/x11)
192.168.11.129 (tcp/6667/irc)
192.168.11.129 (tcp/8009/ajp13)
192.168.11.129 (tcp/8180/www)
192.168.11.129 (tcp/8787)
Synopsis
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.
ls
Solution
ia
n/a
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/111/rpc-portmapper)
us
192.168.11.129 (udp/111/rpc-portmapper)
Ne
192.168.11.129 (tcp/2049/rpc-nfs)
192.168.11.129 (udp/2049/rpc-nfs)
192.168.11.129 (udp/35902/rpc-nlockmgr)
192.168.11.129 (udp/35990/rpc-mountd)
192.168.11.129 (tcp/38053/rpc-mountd)
192.168.11.129 (tcp/39032/rpc-nlockmgr)
192.168.11.129 (udp/58444/rpc-status)
192.168.11.129 (tcp/60280/rpc-status)
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output
Es
192.168.11.129 (tcp/21/ftp)
192.168.11.129 (tcp/22/ssh)
ss
192.168.11.129 (tcp/23/telnet)
Ne
192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/80/www)
192.168.11.129 (tcp/5900/vnc)
192.168.11.129 (tcp/8180/www)
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
ls
n/a
ia
Risk Factor
None
nt
References
se
XREF IAVT:0001-T-0931
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/80/www)
192.168.11.129 (tcp/8180/www)
Ne
Apache-Coyote/1.1
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
ls
n/a
ia
Risk Factor
None
nt
Plugin Information
se
Published: 2008/05/19, Modified: 2021/02/03
Plugin Output
Es
192.168.11.129 (tcp/25/smtp)
Subject Name:
Country: XX
us
Issuer Name:
Ne
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
Fingerprints :
SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]
192.168.11.129 (tcp/5432/postgresql)
Subject Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
Fingerprints :
SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]
Synopsis
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.
ls
See Also
https://en.wikipedia.org/wiki/Domain_Name_System
ia
Solution
nt
Disable this service if it is not needed or restrict access to internal hosts only if the service is available
externally. se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/53/dns)
192.168.11.129 (udp/53/dns)
ss
Ne
Synopsis
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output
Es
192.168.11.129 (tcp/139/smb)
us
192.168.11.129 (tcp/445/cifs)
ss
Synopsis
Description
Nessus was unable to identify a service on the remote host even though it returned a banner of some type.
Solution
ls
n/a
ia
Risk Factor
None
nt
Plugin Information
se
Published: 2002/11/18, Modified: 2022/07/26
Plugin Output
Es
192.168.11.129 (tcp/512)
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
us
Port : 512
Type : spontaneous
Banner :
ss
192.168.11.129 (tcp/8787)
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 8787
Type : get_http
Banner :
0x0000: 00 00 00 03 04 08 46 00 00 03 A1 04 08 6F 3A 16 ......F......o:.
0x0010: 44 52 62 3A 3A 44 52 62 43 6F 6E 6E 45 72 72 6F DRb::DRbConnErro
0x0020: 72 07 3A 07 62 74 5B 17 22 2F 2F 75 73 72 2F 6C r.:.bt[."//usr/l
0x0030: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x0040: 64 72 62 2E 72 62 3A 35 37 33 3A 69 6E 20 60 6C drb.rb:573:in `l
0x0050: 6F 61 64 27 22 37 2F 75 73 72 2F 6C 69 62 2F 72 oad'"7/usr/lib/r
Synopsis
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
ls
https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced
ia
Solution
nt
n/a se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
ss
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.11.129 (tcp/5432/postgresql)
Synopsis
Description
The remote host is running an RMI registry, which acts as a bootstrap naming service for registering and
retrieving remote objects with simple names in the Java Remote Method Invocation (RMI) system.
ls
See Also
https://docs.oracle.com/javase/1.5.0/docs/guide/rmi/spec/rmiTOC.html
ia
http://www.nessus.org/u?b6fd7659
nt
Solution
n/a
se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/1099/rmi_registry)
192.168.11.129 (tcp/1099/rmi_registry)
ss
0x10: DF FF B9 7B 80 02 75 72 00 13 5B 4C 6A 61 76 61 ...{..ur..[Ljava
0x20: 2E 6C 61 6E 67 2E 53 74 72 69 6E 67 3B AD D2 56 .lang.String;..V
0x30: E7 E9 1D 7B 47 02 00 00 70 78 70 00 00 00 00 ...{G...pxp....
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-
Alive is enabled, etc...
This test is informational only and does not denote any security problem.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/80/www)
us
Headers :
Response Body :
<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>
_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
Contact: msfdev[at]metasploit.com
</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>
192.168.11.129 (tcp/8180/www)
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Date: Thu, 19 Dec 2024 17:37:29 GMT
Connection: close
Response Body :
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
img {
border: none;
}
a:link, a:visited {
color: blue
}
th {
font-family: Verdana, "Times New Roman", Times, serif;
font-size: 110%;
font-weight: normal;
font-style: italic;
background: #D2A41C;
text-align: left;
}
td {
color: #000000;
font-family: Arial, Helvetica, sans-serif;
}
td.men [...]
Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN)
attribute does not match the hostname on which the service listens.
ls
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname
ia
that matches the common name in the certificate.
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
us
metasploitable
ss
ubuntu804-base.localdomain
Ne
192.168.11.129 (tcp/5432/postgresql)
metasploitable
ubuntu804-base.localdomain
Synopsis
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the
remote service is using the OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS
ls
extensions (RFC 4366).
ia
See Also
https://www.openssl.org/
nt
Solution
n/a
se
Risk Factor
Es
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/25/smtp)
192.168.11.129 (tcp/5432/postgresql)
Ne
Synopsis
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2011/12/01, Modified: 2023/07/10
Plugin Output
Es
192.168.11.129 (tcp/25/smtp)
us
192.168.11.129 (tcp/5432/postgresql)
ss
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.
ls
See Also
ia
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
nt
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
se
Solution
n/a
Es
Risk Factor
None
us
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
Ne
Here is the list of SSL PFS ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
57041 (2) - SSL Perfect Forward Secrecy Cipher Suites Supported 108
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
192.168.11.129 (tcp/5432/postgresql)
Here is the list of SSL PFS ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
57041 (2) - SSL Perfect Forward Secrecy Cipher Suites Supported 109
62563 (2) - SSL Compression Methods Supported
Synopsis
The remote service supports one or more compression methods for SSL connections.
Description
This script detects which compression methods are supported by the remote service for SSL connections.
See Also
ls
http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
https://tools.ietf.org/html/rfc3749
ia
https://tools.ietf.org/html/rfc3943
https://tools.ietf.org/html/rfc5246
Solution
nt
se
n/a
Risk Factor
Es
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/25/smtp)
Ne
DEFLATE (0x01)
192.168.11.129 (tcp/5432/postgresql)
DEFLATE (0x01)
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks
with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.
ls
See Also
ia
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
nt
https://www.openssl.org/~bodo/tls-cbc.txt
se
Solution
n/a
Es
Risk Factor
None
us
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
Ne
Here is the list of SSL CBC ciphers supported by the remote server :
70544 (2) - SSL Cipher Block Chaining Cipher Suites Supported 111
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.11.129 (tcp/5432/postgresql)
Here is the list of SSL CBC ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
70544 (2) - SSL Cipher Block Chaining Cipher Suites Supported 112
156899 (2) - SSL/TLS Recommended Cipher Suites
Synopsis
Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to
only enable support for the following cipher suites:
TLSv1.3:
ls
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
ia
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
nt
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
se
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
Es
This is the recommended configuration for the vast majority of services, as it is highly secure and
compatible with nearly every client released in the last five (or more) years.
us
See Also
https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/
ss
Solution
Ne
Risk Factor
None
Plugin Information
Plugin Output
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
192.168.11.129 (tcp/5432/postgresql)
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
Description
The remote host is running BIND or another DNS server that reports its version number when it receives a
special request for the text 'version.bind' in the domain 'chaos'.
This version is not necessarily accurate and could even be forged, as some DNS servers send the
ls
information based on a configuration file.
ia
Solution
It is possible to hide the version number of BIND by using the 'version' directive in the 'options' section in
named.conf.
Risk Factor
nt
se
None
References
Es
XREF IAVT:0001-T-0583
Plugin Information
us
Plugin Output
ss
192.168.11.129 (udp/53/dns)
Ne
Version : 9.4.2
10028 (1) - DNS Server BIND version Directive Remote Version Detection 116
10092 (1) - FTP Server Detection
Synopsis
Description
It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
Solution
ls
n/a
ia
Risk Factor
None
nt
References
se
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943
Es
Plugin Information
Plugin Output
us
192.168.11.129 (tcp/21/ftp)
ss
Synopsis
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB
requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (udp/137/netbios-ns)
us
This SMB server seems to be a Samba server - its MAC address is NULL.
10150 (1) - Windows NetBIOS / SMB Remote Host Information Disclosure 118
10223 (1) - RPC portmapper Service Detection
Synopsis
Description
The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
CVSS v3.0 Base Score
0.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
Es
0.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:N)
us
References
CVE CVE-1999-0632
ss
Plugin Information
Ne
Plugin Output
192.168.11.129 (udp/111/rpc-portmapper)
Synopsis
Description
Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.
ls
Solution
ia
Disable this service if you do not use it, or filter incoming traffic to this port.
Risk Factor
nt
None se
References
XREF IAVT:0001-T-0932
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
ss
Synopsis
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication
request.
ls
Solution
n/a
ia
Risk Factor
nt
None
References
se
XREF IAVT:0001-T-0933
Es
Plugin Information
Plugin Output
us
192.168.11.129 (tcp/22/ssh)
ss
Synopsis
Description
Solution
ls
Disable this service if you do not use it.
ia
Risk Factor
None
nt
Plugin Information
se
Published: 1999/10/12, Modified: 2020/06/12
Plugin Output
Es
192.168.11.129 (tcp/23/telnet)
_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
ss
|_|
Warning: Never expose this VM to an untrusted network!
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
Ne
metasploitable login:
------------------------------ snip ------------------------------
Synopsis
Description
Solution
ls
n/a
ia
Risk Factor
None
nt
Plugin Information
se
Published: 1999/11/27, Modified: 2023/12/04
Plugin Output
Es
192.168.11.129 (udp/0)
Hop Count: 1
ss
Ne
Synopsis
Description
The remote host is running VNC (Virtual Network Computing), which uses the RFB (Remote Framebuffer)
protocol to provide remote access to graphical user interfaces and thus permits a console on the remote
host to be displayed on another.
ls
See Also
ia
https://en.wikipedia.org/wiki/Vnc
nt
Solution
Make sure use of this software is done in accordance with your organization's security policy and filter
incoming traffic to this port.
se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/5900/vnc)
ss
3.3
Synopsis
Description
It was possible to obtain the browse list of the remote Windows system by sending a request to the
LANMAN pipe. The browse list is the list of the nearest Windows systems of the remote host.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2000/05/09, Modified: 2022/02/01
Plugin Output
Es
192.168.11.129 (tcp/445/cifs)
us
DESKTOP-V3A2KBR ( os : 0.0 )
METASPLOITABLE ( os : 0.0 )
ss
Ne
10397 (1) - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure 125
10437 (1) - NFS Share Export List
Synopsis
Description
See Also
ls
http://www.tldp.org/HOWTO/NFS-HOWTO/security.html
ia
Solution
Risk Factor
nt
se
None
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/2049/rpc-nfs)
/ *
Ne
Synopsis
Description
Solution
ls
n/a
ia
Risk Factor
None
nt
References
se
XREF IAVT:0001-T-0802
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/3306/mysql)
Version : 5.0.51a-3ubuntu5
ss
Protocol : 10
Server Status : SERVER_STATUS_AUTOCOMMIT
Server Capabilities :
CLIENT_LONG_FLAG (Get all column flags)
Ne
Synopsis
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by
sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on
the host.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/445/cifs)
us
10785 (1) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure 128
10881 (1) - SSH Protocol Versions Supported
Synopsis
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
ls
n/a
ia
Risk Factor
None
nt
Plugin Information
se
Published: 2002/03/06, Modified: 2024/07/24
Plugin Output
Es
192.168.11.129 (tcp/22/ssh)
- 1.99
- 2.0
ss
Ne
Synopsis
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives a 'HELP'
request.
ls
Solution
ia
n/a
nt
Risk Factor
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/3306/mysql)
us
Synopsis
Description
Solution
ls
n/a
ia
Risk Factor
None
nt
Plugin Information
se
Published: 2002/11/19, Modified: 2016/01/08
Plugin Output
Es
192.168.11.129 (tcp/6667/irc)
Synopsis
Description
The remote web server uses its default welcome page. Therefore, it's probable that this server is not used
at all or is serving content that is meant to be hidden.
ls
Solution
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2003/03/20, Modified: 2018/08/15
Plugin Output
Es
192.168.11.129 (tcp/8180/www)
us
11422 (1) - Web Server Unconfigured - Default Install Page Present 132
11424 (1) - WebDAV Detection
Synopsis
Description
ls
If you do not use this extension, you should disable it.
Solution
ia
http://support.microsoft.com/default.aspx?kbid=241520
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/80/www)
us
ss
Ne
Synopsis
Description
The remote host is running a TFTP (Trivial File Transfer Protocol) daemon. TFTP is often used by routers and
diskless hosts to retrieve their configuration. It can also be used by worms to propagate.
ls
Solution
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2003/08/13, Modified: 2022/12/28
Plugin Output
Es
192.168.11.129 (udp/69/tftp)
us
ss
Ne
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess
the name of the remote operating system in use. It is also possible sometimes to guess the version of the
operating system.
ls
Solution
ia
n/a
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/0)
us
Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.
SSH:SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
Ne
SinFP:
P1:B10113:F0x12:W5840:O0204ffff:M1460:
P2:B10113:F0x12:W5792:O0204ffff0402080affffffff4445414401030305:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191003_7_p=2121
SMTP:!:220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
SSLcert:!:i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple
Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple
Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/
CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
The remote host is running Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)
Synopsis
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.
ls
Solution
n/a
ia
Risk Factor
nt
None
References
se
XREF IAVT:0001-T-0935
Es
Plugin Information
Plugin Output
us
192.168.11.129 (tcp/6667/irc)
Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution
the remote host is running.
ls
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and
ia
restart Apache.
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/0)
us
Synopsis
Description
This script checks the remote VNC server protocol version and the available 'security types'.
Solution
ls
n/a
ia
Risk Factor
None
nt
Plugin Information
se
Published: 2005/07/22, Modified: 2021/07/13
Plugin Output
Es
192.168.11.129 (tcp/5900/vnc)
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
ls
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
ia
- The port range scanned.
- The ping round trip time
nt
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
se
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Es
Solution
n/a
us
Risk Factor
None
ss
Plugin Information
Ne
Plugin Output
192.168.11.129 (tcp/0)
Synopsis
Description
According to the MAC address of its network adapter, the remote host is a VMware virtual machine.
Solution
ls
Since it is physically accessible through the network, ensure that its configuration matches your
organization's security policy.
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2005/10/27, Modified: 2019/12/11
Plugin Output
Es
192.168.11.129 (tcp/0)
us
Synopsis
The remote web server contains a graphic image that is prone to information disclosure.
Description
The 'favicon.ico' file found on the remote web server belongs to a popular web server. This may be used to
fingerprint the web server.
ls
Solution
Remove the 'favicon.ico' file or create a custom one for your site.
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2005/10/28, Modified: 2020/06/12
Plugin Output
Es
192.168.11.129 (tcp/8180/www)
us
Synopsis
Description
The remote host is running an A JP (Apache JServ Protocol) connector, a service by which a standalone web
server such as Apache communicates over TCP with a Java servlet container such as Tomcat.
ls
See Also
http://tomcat.apache.org/connectors-doc/
ia
http://tomcat.apache.org/connectors-doc/ajp/ajpv13a.html
nt
Solution
n/a
se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/8009/ajp13)
ss
Synopsis
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that
the uptime of the remote host can sometimes be computed.
ls
See Also
http://www.ietf.org/rfc/rfc1323.txt
ia
Solution
nt
n/a
Risk Factor
se
None
Es
Plugin Information
Plugin Output
us
192.168.11.129 (tcp/0)
ss
Ne
Synopsis
Description
The remote host is running Samba, a CIFS/SMB server for Linux and Unix.
See Also
ls
https://www.samba.org/
ia
Solution
n/a
Risk Factor
nt
se
None
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/445/cifs)
ss
Ne
Synopsis
Description
See Also
ls
https://www.postgresql.org/
ia
Solution
Risk Factor
nt
se
None
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/5432/postgresql)
ss
Ne
Synopsis
Description
It is possible to learn the remote host name by querying the remote DNS server for 'hostname.bind' in the
CHAOS domain.
ls
Solution
It may be possible to disable this feature. Consult the vendor's documentation for more information.
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2009/01/15, Modified: 2011/09/14
Plugin Output
Es
192.168.11.129 (udp/53/dns)
us
metasploitable
ss
Ne
Synopsis
Description
The remote DNS resolver accepts DNSSEC options. This means that it may verify the authenticity of
DNSSEC protected zones if it is configured to trust their keys.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2009/01/15, Modified: 2013/11/21
Plugin Output
Es
192.168.11.129 (udp/53/dns)
us
ss
Ne
Synopsis
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.
ls
See Also
https://standards.ieee.org/faqs/regauth.html
ia
http://www.nessus.org/u?794673b4
nt
Solution
n/a
se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/0)
ss
Synopsis
Description
See Also
ls
https://tomcat.apache.org/
ia
Solution
n/a
Risk Factor
nt
se
None
References
Es
XREF IAVT:0001-T-0535
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/8180/www)
Ne
URL : http://192.168.11.129:8180/
Version : 5.5
backported : 0
source : Apache Tomcat/5.5
Synopsis
Description
Security patches may have been 'backported' to the remote SSH server without changing its version
number.
ls
Note that this test is informational only and does not denote any security problem.
ia
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
nt
se
n/a
Risk Factor
Es
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/22/ssh)
Ne
Synopsis
Description
Security patches may have been 'backported' to the remote HTTP server without changing its version
number.
ls
Note that this test is informational only and does not denote any security problem.
ia
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
nt
se
n/a
Risk Factor
Es
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/80/www)
Ne
Synopsis
Description
The remote SMTP service supports the use of the 'STARTTLS' command to switch from a cleartext to an
encrypted communications channel.
ls
See Also
https://en.wikipedia.org/wiki/STARTTLS
ia
https://tools.ietf.org/html/rfc2487
nt
Solution
n/a
se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
ss
Here is the SMTP service's SSL certificate that Nessus was able to
collect after sending a 'STARTTLS' command :
Ne
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform
Enumeration) matches for various hardware and software products found on a host.
Note that if an official CPE is not available for the product, this plugin computes the best possible CPE
ls
based on the information available from the scan.
ia
See Also
http://cpe.mitre.org/
nt
https://nvd.nist.gov/products/cpe
Solution
se
n/a
Es
Risk Factor
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/0)
Ne
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the
version number from the banner.
ls
See Also
https://httpd.apache.org/
ia
Solution
nt
n/a
Risk Factor
se
None
Es
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530
us
Plugin Information
Plugin Output
192.168.11.129 (tcp/80/www)
Ne
URL : http://192.168.11.129/
Version : 2.2.99
Source : Server: Apache/2.2.8 (Ubuntu) DAV/2
backported : 1
modules : DAV/2
os : ConvertedUbuntu
Synopsis
It was possible to obtain the version number of the remote PHP installation.
Description
Nessus was able to determine the version of PHP available on the remote web server.
Solution
ls
n/a
ia
Risk Factor
None
nt
References
se
XREF IAVT:0001-T-0936
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/80/www)
Version : 5.2.4-2ubuntu5.10
Source : X-Powered-By: PHP/5.2.4-2ubuntu5.10
Ne
Synopsis
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to
receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the
session ID in the second connection, the server maintains a cache of sessions that can be resumed.
ls
Solution
ia
n/a
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/25/smtp)
us
Synopsis
Description
The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.
See Also
ls
http://vsftpd.beasts.org/
ia
Solution
n/a
Risk Factor
nt
se
None
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/21/ftp)
Version : 2.3.4
Ne
Synopsis
Description
The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/111/rpc-portmapper)
us
ss
Ne
Synopsis
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a
printer, router, general-purpose computer, etc).
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2011/05/23, Modified: 2022/09/09
Plugin Output
Es
192.168.11.129 (tcp/0)
Confidence level : 95
ss
Ne
Synopsis
A VNC server with one or more unencrypted 'security-types' is running on the remote host.
Description
This script checks the remote VNC server protocol version and the available 'security types' to determine if
any unencrypted 'security-types' are in use or available.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2013/04/03, Modified: 2014/03/12
Plugin Output
Es
192.168.11.129 (tcp/5900/vnc)
us
2 (VNC authentication)
ss
Ne
Synopsis
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch
to install to make sure the remote host is up-to-date.
Note: Because the 'Show missing patches that have been superseded' setting in your scan policy depends
ls
on this plugin, it will always run and cannot be disabled.
ia
Solution
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/0)
us
[ ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS (139915) ]
+ Action to take : Re-download the software, verify it using the published MD5 / SHA1 checksums, and
re-install it.
Synopsis
Nessus was able to obtain version information on the remote DNS server.
Description
Nessus was able to obtain version information by sending a special TXT record query to the remote host.
Note that this version is not necessarily accurate and could even be forged, as some DNS servers send the
information based on a configuration file.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
References
XREF IAVT:0001-T-0030
Es
XREF IAVT:0001-T-0937
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/53/dns)
Ne
9.4.2
Synopsis
Description
Security patches may have been 'backported' to the remote PHP install without changing its version
number.
ls
Note that this test is informational only and does not denote any security problem.
ia
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
nt
se
n/a
Risk Factor
Es
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/80/www)
Ne
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and
Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single,
unique, and uniform list.
ls
Solution
ia
n/a
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/0)
us
Synopsis
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft
recommends that users discontinue the use of SMBv1 due to the lack of security features that were
included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that
ls
affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-
CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
ia
See Also
nt
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-
smbv3-in-windows-and
se
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
Es
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB
us
directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block
TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
ss
None
Ne
References
XREF IAVT:0001-T-0710
Plugin Information
Plugin Output
192.168.11.129 (tcp/445/cifs)
96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check) 168
The remote host supports SMBv1.
96982 (1) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check) 169
100871 (1) - Microsoft Windows SMB Versions Supported (remote check)
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication
request to port 139 or 445.
Note that this plugin is a remote check and does not work on agents.
ls
Solution
ia
n/a
nt
Risk Factor
None
se
Plugin Information
Plugin Output
192.168.11.129 (tcp/445/cifs)
us
100871 (1) - Microsoft Windows SMB Versions Supported (remote check) 170
104887 (1) - Samba Version
Synopsis
It was possible to obtain the samba version from the remote operating system.
Description
Nessus was able to obtain the samba version from the remote operating by sending an authentication
request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
ls
Solution
n/a
ia
Risk Factor
nt
None
Plugin Information
se
Published: 2017/11/30, Modified: 2019/11/22
Plugin Output
Es
192.168.11.129 (tcp/445/cifs)
us
Synopsis
It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an
authentication request to port 139 or 445.
ls
Solution
ia
n/a
Risk Factor
nt
None se
Plugin Information
Plugin Output
192.168.11.129 (tcp/445/cifs)
us
The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
ss
3.1.1 Windows 10
106716 (1) - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check) 172
110723 (1) - Target Credential Status by Authentication Protocol - No Credentials
Provided
Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the
scan policy.
Description
Nessus was not able to successfully authenticate directly to the remote target on an available
authentication protocol. Nessus was able to connect to the remote port and identify that the service
ls
running on the port supports an authentication protocol, but Nessus failed to authenticate to the
remote service using the provided credentials. There may have been a protocol failure that prevented
authentication from being attempted or all of the provided credentials for the authentication protocol may
ia
be invalid. See plugin output for error details.
nt
- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and
not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were
provided for an available SNMP service.
se
- Providing valid credentials for all available authentication protocols may improve scan coverage, but the
value of successful authentication for a given protocol may vary from target to target depending upon what
data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
Es
more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is
more valuable for Windows targets than for Linux targets.
Solution
us
n/a
Risk Factor
ss
None
Ne
References
XREF IAVB:0001-B-0504
Plugin Information
Plugin Output
192.168.11.129 (tcp/0)
110723 (1) - Target Credential Status by Authentication Protocol - No Credentials Provided 173
SSH local checks were not enabled.
110723 (1) - Target Credential Status by Authentication Protocol - No Credentials Provided 174
117886 (1) - OS Security Patch Assessment Not Available
Synopsis
Description
ls
target, the target may not have been identified, or another issue may have occurred that prevented OS
security patch assessment from being available. See plugin output for details.
ia
This plugin reports non-failure information impacting the availability of OS Security Patch Assessment.
Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is
not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks
nt
Not Supported' will report concurrently with this plugin.
Solution
se
n/a
Risk Factor
Es
None
References
us
XREF IAVB:0001-B-0515
Plugin Information
ss
Plugin Output
192.168.11.129 (tcp/0)
- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.
Synopsis
Description
The remote PostgreSQL server supports the use of encryption initiated during pre-login to switch from a
cleartext to an encrypted communications channel.
ls
See Also
https://www.postgresql.org/docs/9.2/protocol-flow.html#AEN96066
ia
https://www.postgresql.org/docs/9.2/protocol-message-formats.html
nt
Solution
n/a
se
Risk Factor
None
Es
Plugin Information
Plugin Output
192.168.11.129 (tcp/5432/postgresql)
ss
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain
Issuer Name:
Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC
Version: 1
Synopsis
Description
WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI
queries are used to gather information about the remote host, such as its current state, network interface
configuration, etc.
ls
Without this information Nessus may not be able to identify installed software or security vunerabilities
that exist on the remote host.
ia
See Also
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page
Solution
nt
se
n/a
Risk Factor
Es
None
Plugin Information
us
Plugin Output
ss
192.168.11.129 (tcp/445/cifs)
Ne
Synopsis
Description
See Also
ls
https://tools.ietf.org/html/rfc4252#section-8
ia
Solution
n/a
Risk Factor
nt
se
None
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/22/ssh)
ss
Ne
Synopsis
Description
See Also
ls
https://www.openssh.com/
ia
Solution
n/a
Risk Factor
nt
se
None
Plugin Information
Es
Plugin Output
us
192.168.11.129 (tcp/22/ssh)
Service : ssh
ss
Version : 4.7p1
Banner : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
Ne